Different load balancer form factors don't always perform nor repackage well. Learn how HAProxy's unique software-first approach addresses common pain points when choosing the right form factor.
In this post, we will show how you can use an HAProxy Enterprise load balancer to protect against CitrixBleed by placing it in front of your NetScaler instance(s).
We have received questions regarding CVE-2023-45539 issued in November 2023. The versions of our products released on Monday, 21 August 2023 to fix...
While there are core differences between web apps and APIs, a unified security strategy is crucial. In this blog, we'll discuss why both types of security appear different yet are inherently linked.
The sun has officially set on KubeCon North America 2023, but the CNCF's flagship event has left a lasting impression on us. Here's what we observed, what we talked about, and what resonated.
To avoid overspending, businesses should reevaluate their security vendors and prioritize a more cost-effective approach.
In this guide, we’ll explain why connection data matters. Next, we'll cover how the PROXY protocol works, how to use the TShark analyzer to capture and inspect packets and view the extraction results.
CVE-2023-44487 found in the HTTP/2 protocol could allow a DoS attack against web servers, reverse proxies, or other software. HAProxy products are unaffected, but we're monitoring the situation.
Showing 1 of 21 Pages